CVE-2014-4975

Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
References
Link Resource
http://advisories.mageia.org/MGASA-2014-0472.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1912.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1913.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1914.html Third Party Advisory
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778 Vendor Advisory
http://www.debian.org/security/2015/dsa-3157 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:129 Broken Link
http://www.openwall.com/lists/oss-security/2014/07/09/13 Mailing List
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/68474 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2397-1 Third Party Advisory
https://bugs.ruby-lang.org/issues/10019 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1118158 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/94706
http://advisories.mageia.org/MGASA-2014-0472.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1912.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1913.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1914.html Third Party Advisory
http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778 Vendor Advisory
http://www.debian.org/security/2015/dsa-3157 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:129 Broken Link
http://www.openwall.com/lists/oss-security/2014/07/09/13 Mailing List
http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html Third Party Advisory
http://www.securityfocus.com/bid/68474 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2397-1 Third Party Advisory
https://bugs.ruby-lang.org/issues/10019 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1118158 Issue Tracking
https://exchange.xforce.ibmcloud.com/vulnerabilities/94706
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1:-:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.1.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*

History

21 Nov 2024, 02:11

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0472.html - Third Party Advisory () http://advisories.mageia.org/MGASA-2014-0472.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-1912.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-1912.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-1913.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-1913.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-1914.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-1914.html - Third Party Advisory
References () http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778 - Vendor Advisory () http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778 - Vendor Advisory
References () http://www.debian.org/security/2015/dsa-3157 - Third Party Advisory () http://www.debian.org/security/2015/dsa-3157 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:129 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2015:129 - Broken Link
References () http://www.openwall.com/lists/oss-security/2014/07/09/13 - Mailing List () http://www.openwall.com/lists/oss-security/2014/07/09/13 - Mailing List
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - Third Party Advisory
References () http://www.securityfocus.com/bid/68474 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/68474 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-2397-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2397-1 - Third Party Advisory
References () https://bugs.ruby-lang.org/issues/10019 - Vendor Advisory () https://bugs.ruby-lang.org/issues/10019 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1118158 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1118158 - Issue Tracking
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/94706 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/94706 -

Information

Published : 2014-11-15 20:59

Updated : 2024-11-21 02:11


NVD link : CVE-2014-4975

Mitre link : CVE-2014-4975

CVE.ORG link : CVE-2014-4975


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_hpc_node
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

ruby-lang

  • ruby

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer